by William Bashir | Oct 1, 2020 | Today
A drop attack is often the outcome of a direct blow to the neck or head. Though they are often associated with sports-related trauma, military and police training may also result in such an injury. A serious blow to the head can cause the death of an athlete or the...
by William Bashir | Sep 13, 2020 | Today
Redteam is a leading provider of Penetration Testing, Social Engineering and Red Teaming services. They have offices in North America, UK, Australia, Spain, Vietnam, China, Italy and India. It has earned a good name as one of the top IT consulting companies. With over...
by William Bashir | Sep 6, 2020 | Today
Bank Cyber Security is an ongoing concern to many financial institutions. Due to the recent upswing in Internet fraud and other crimes, more banks and lending institutions are investing in cyber security for their networks. While it is true that the costs of cyber...
by William Bashir | Aug 31, 2020 | Today
There are many security holes in the current crop of malicious software such as the recently released Remote Access Virus that is what to do when it comes to dealing with Ransomware. This type of malware is one that is commonly referred to as “malware”...
by William Bashir | Jul 11, 2020 | Today
The other day I was talking to someone who has an IT background and she asked me what is a thumb drive? She wanted to know about RDI-MS (Remote Direct Memory Devices) and what they are used for. Well, let me tell you, that is quite a loaded question and one that need...
by William Bashir | Jul 8, 2020 | Today
What is Social Engineering? Social Engineering is basically a penetration technique that hackers use to gain access to secure and private data, usually by using some important knowledge about the targeted victim or simply by tricking and influencing the targeted user...